name |
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model 1.3 |
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021 |
category |
Multi-Function Devices |
Operating Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
02.12.2019 |
01.09.2019 |
not_valid_before |
27.11.2014 |
09.11.2005 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0447_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0447_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf |
manufacturer |
Canon Inc. |
Microsoft Corporation |
manufacturer_web |
https://www.canon.com/ |
https://www.microsoft.com |
security_level |
EAL3+, ALC_FLR.2 |
EAL4+, ALC_FLR.3 |
dgst |
9f19da4daef5570e |
bbe326d5bfbd5036 |
heuristics/cert_id |
JISEC-CC-CRP-C0447 |
BSI-DSZ-CC-0284-2005 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_IGS.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ADV_FUN.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.3, 2600.1 |
6.5.7226.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0447
- certification_date: 01.11.2014
- claim: EAL3+ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0447_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Canon imageRUNNER ADVANCE C5200 Series 2600.1 model
- product_type: Multifunction Product
- protection_profile: IEEE Std 2600.1™-2009
- report_link: https://www.ipa.go.jp/en/security/c0447_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0447_est.pdf
- toe_version: 1.3
- vendor: Canon Inc.
- expiration_date: 01.12.2019
- revalidations: [frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0447_it4516_01.html'})]
- supplier: Canon Inc.
- toe_japan_name: Canon imageRUNNER ADVANCE C5200 Series 2600.1 model1.3
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0447_it4516.html
- toe_overseas_name: Canon imageRUNNER ADVANCE C5900KB/C5200 Series 2600.1 model1.4
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
32475ccb695b1644 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0447_erpt.pdf |
0284a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0284-2005
- cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
- cert_lab: BSI
- developer: Microsoft Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0447-01: 1
- Certification No. C0447: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 4
- EAL3 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
- A:
- A.ACCESS_CONTROL: 2
- A.COM_PROT: 2
- A.CORRECT_HW: 2
- A.INSTALL: 2
- A.MANAGE: 2
- A.NO_EVIL_ADM: 2
- A.PHYS_PROTECT: 2
- T:
- T.AUTH_DAC: 1
- T.DL_MISUSE: 1
- T.OVERFLOW: 1
- T.SPAM: 1
- T.UNAUTHUSE: 1
- T.UNAUTH_DAC: 1
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 17
- Microsoft Corporation: 6
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
- OutOfScope:
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
- of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
- out of scope: 4
|
pdf_data/report_metadata |
- /CreationDate: D:20160112164043+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160112164226+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 330024
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
- /Author: Federal Office for Information Security (BSI)
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20051220074356+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20051220075600+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20051220064348
- /Subject: BSI-DSZ-CC-0284-2005
- /Title: Certification Report
- pdf_file_size_bytes: 399534
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
pdf_data/st_filename |
c0447_est.pdf |
0284b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL 3 augmented: 1
- EAL3: 9
- EAL3 augmented: 8
|
- EAL:
- EAL4: 10
- EAL4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 12
- ALC_LCD.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 9
- ADV_FSP.2: 2
- ADV_FUN.1: 1
- ADV_HLD.1: 2
- ADV_HLD.2: 3
- ADV_IGS.1: 1
- ADV_IMP.1: 3
- ADV_LLD.1: 4
- ADV_RCR.1: 5
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 4
- ALC:
- ALC_DVS.1: 3
- ALC_FLR.3: 9
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ASE:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 24
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 12
- FCS_COP.1: 25
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 53
- FDP_ACC.1.1: 4
- FDP_ACF.1: 40
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 7
- FIA_UID.1: 22
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 23
- FMT_MSA.1.1: 2
- FMT_MSA.3: 25
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 18
- FMT_MTD.1.1: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_CIP_EXP: 2
- FPT_CIP_EXP.1: 16
- FPT_CIP_EXP.1.1: 2
- FPT_CIP_EXP.1.2: 3
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 15
- FTA_SSL.3.1: 2
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FDP:
- FDP_ACC.1: 42
- FDP_ACC.1.1: 4
- FDP_ACF.1: 40
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC.1: 25
- FDP_IFC.1.1: 1
- FDP_IFF.1: 20
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_ACC.1: 1
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 28
- FMT_MSA.1.1: 3
- FMT_MSA.3: 52
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FRU:
- FRU_RSA.1: 18
- FRU_RSA.1.1: 2
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 8
- D.DOC: 16
- D.FUNC: 11
- D.PROT: 6
- O:
- O.AUDIT: 7
- O.CONF: 16
- O.DOC: 16
- O.FUNC: 8
- O.HDD: 8
- O.INTERFACE: 8
- O.PROT: 8
- O.SOFTWARE: 7
- O.USER: 14
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 4
- OE.AUDIT_ACCESS: 4
- OE.AUDIT_STORAGE: 4
- OE.INTERFACE: 4
- OE.PHYISCAL: 2
- OE.PHYSICAL: 2
- OE.USER: 14
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- A.ACCESS_CONTROL: 3
- A.COM_PROT: 3
- A.CORRECT_HW: 3
- A.INSTALL: 4
- A.MANAGE: 4
- A.NO_EVIL_ADM: 2
- A.NO_EVIL_ADMIN: 1
- A.PHYS_PROTECT: 4
- O:
- O.CONBLK: 13
- O.DAC: 16
- O.FILTER_EMAIL: 10
- O.QUOTA: 12
- O.RESTDIST: 11
- OE:
- OE.COM_PROT: 5
- OE.DAC: 12
- OE.INSTALL: 3
- OE.PHYSICAL: 3
- OE.PLATFORM_: 1
- OE.PLATFORM_SUPPORT: 4
- T:
- T.AUTH_DAC: 4
- T.DL_MISUSE: 4
- T.OVERFLOW: 4
- T.SPAM: 9
- T.UNAUTHUSE: 3
- T.UNAUTH_DAC: 3
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 2
- Microsoft Corporation: 1
|
- Microsoft:
- Microsoft: 20
- Microsoft Corporation: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 1
- physical tampering: 4
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186-2: 4
- FIPS PUB 197: 3
- FIPS PUB 46-3: 1
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- RFC:
- RFC1725: 1
- RFC1730: 1
- RFC821: 11
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
- out of scope: 2
- the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20151224205603+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords:
- /ModDate: D:20151224205606+09'00'
- /Producer: Adobe LiveCycle PDFGenerator
- /Subject:
- /Title: Canon imageRUNNER ADVANCE C5200 Series 2600.1 model Security Target
- pdf_file_size_bytes: 832222
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 66
|
- /Author: slabihou
- /CreationDate: D:20050713145508+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
- /Title: MS_EX_ST_1.9.doc
- pdf_file_size_bytes: 285736
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |